Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud

Cloud computing became an emerging technology. The benefits have made a lot of institutions and companies looking to use this technology. The process of migration from legacy systems to cloud computing environments is a complex process. The migration process does not represent the movement of data, applications and service only but also presents the process from the early stages of planning and continue until after the selection and transfer of data to a specific deployment model. Security is the biggest concern to consumers during the migration process, whether immigration initial from legacy systems to the environment of cloud computing or migration between the clouds. This paper presents an overview of the security requirements: before, during and after the migration from legacy systems to cloud computing, as well as security requirements data migration between the clouds. Keywords-Cloud systems; migration; cloud to cloud; cloud security

[1]  Martin Gilje Jaatun,et al.  Deployment models: Towards eliminating security concerns from cloud computing , 2010, 2010 International Conference on High Performance Computing & Simulation.

[2]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.

[3]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[4]  William H. Money,et al.  Service Migration in a Cloud Architecture , 2011, 2011 44th Hawaii International Conference on System Sciences.

[5]  Ying Zhang,et al.  SecDM: Securing Data Migration between Cloud Storage Systems , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[6]  Ian Sommerville,et al.  Decision Support Tools for Cloud Migration in the Enterprise , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[7]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[8]  Joydipto Banerjee Moving to the cloud: Workload migration techniques and approaches , 2012, 2012 19th International Conference on High Performance Computing.

[9]  Yi Lin,et al.  Ensure Data Security in Cloud Storage , 2011, 2011 International Conference on Network Computing and Information Security.